A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation Y Hayashi, N Homma, M Miura, T Aoki, H Sone Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 103 | 2014 |
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2013 | 85 | 2013 |
Card-based protocols for any boolean function T Nishida, Y Hayashi, T Mizuki, H Sone Theory and Applications of Models of Computation: 12th Annual Conference …, 2015 | 71 | 2015 |
The Minimum Number of Cards in Practical Card-Based Protocols J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone International Conference on the Theory and Application of Cryptology and …, 2017 | 65 | 2017 |
Role of the metallic phase arc discharge on arc erosion in Ag contacts H Sone, T Takagi IEEE Transactions on Components, Hybrids, and Manufacturing Technology 13 (1 …, 1990 | 65 | 1990 |
Flexible access management system for campus VLAN based on OpenFlow Y Yamasaki, Y Miyamoto, J Yamato, H Goto, H Sone 2011 IEEE/IPSJ International Symposium on Applications and the Internet, 347-351, 2011 | 62 | 2011 |
Interactive physical zero-knowledge proof for Norinori JG Dumas, P Lafourcade, D Miyahara, T Mizuki, T Sasaki, H Sone Computing and Combinatorics: 25th International Conference, COCOON 2019, Xi …, 2019 | 54 | 2019 |
Card-Based Physical Zero-Knowledge Proof for Kakuro D MIYAHARA, T SASAKI, T MIZUKI, H SONE IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2019 | 52 | 2019 |
Securely computing the three-input majority function with eight cards T Nishida, T Mizuki, H Sone International Conference on Theory and Practice of Natural Computing, 193-204, 2013 | 50 | 2013 |
Transient IEMI threats for cryptographic devices Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone IEEE transactions on Electromagnetic Compatibility 55 (1), 140-148, 2013 | 49 | 2013 |
Non-invasive EMI-based fault injection attack against cryptographic modules Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone 2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011 | 47 | 2011 |
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ... IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2013 | 46 | 2013 |
A new dynamical domain decomposition method for parallel molecular dynamics simulation V Zhakhovskii, K Nishihara, Y Fukuda, S Shimojo, T Akiyama, S Miyanaga, ... CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid …, 2005 | 44 | 2005 |
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles Y Abe, Y Hayashi, T Mizuki, H Sone Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 3-8, 2018 | 36 | 2018 |
Pile-Shifting Scramble for Card-Based Protocols A NISHIMURA, Y HAYASHI, T MIZUKI, H SONE IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018 | 35 | 2018 |
Spectrum analysis on cryptographic modules to counteract side-channel attacks T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh EMC 9, 21-24, 2009 | 34 | 2009 |
Card-based protocols using unequal division shuffles A Nishimura, T Nishida, Y Hayashi, T Mizuki, H Sone Soft Computing 22 (2), 361-371, 2018 | 29 | 2018 |
Securely computing three-input functions with eight cards T Nishida, Y Hayashi, T Mizuki, H Sone IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015 | 28 | 2015 |
Card-based protocols for secure ranking computations K Takashima, Y Abe, T Sasaki, D Miyahara, K Shinagawa, T Mizuki, ... Theoretical Computer Science 845, 122-135, 2020 | 27 | 2020 |
Card-based zero-knowledge proof for sudoku T Sasaki, T Mizuki, H Sone 9th International Conference on Fun with Algorithms (FUN 2018), 2018 | 27 | 2018 |